This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Just as every presidential candidate this cycle is the candidate of Change, it seems that all the DBMS vendors offer the preferred data-warehouse appliance solution. That's the message I heard from appliance panelists at today's TDWI Washington DC chapter meeting. For a couple of them it was a real stretch, which in one case wasn't a bad thing. The net take-away is that we are seeing Change in the DBMS world, even if for the politicians that word is still only a promise.

Forget the old business models of enterprise software and services, Vivendi's video games branch just posted one of its best margins ever, all thanks to a bunch of druids, goblins, orcs, elves, and fairies.

Late last year, Mozilla promised to "rock" the mobile Web with a new mobile browser of its own. Mozilla admits that success won't happen overnight, but a spokesperson did say, "Mozilla's mission is to break open a closed market." Can Mozilla be a player in an already crowded field of alternatives?

Wired has a How-To Wiki on its site that often has great little blurbs on how to get things done. Today's How-To idea? How to embarrass, frustrate, or annoy your enemies by sending them Google bombs. Is this valuable knowledge to share? Is bombing people on the Internet something mature professionals do? Or is it

Darwin would have liked our industry. Evolution is constant and predictable, and it's particularly so for Ethernet, from its original 10 Mbps incarnation to the current 10 Gbps version -- pricing, power consumption, and port density follow a similar trend line. But just because the evolution happens, doesn't mean that it's easy.

Hardware hacking: it isn't just for those of us with soldering-iron skills anymore, as the hacks for the iPhone clearly show. I don't have an iPhone, but I do have a Canon PowerShot A560, and as it turns out, that's another device that can be hacked thanks to some firmware wizardry.

The Seattle Post-Intelligencer got its hands on the Microsoft e-mails that are part of the lawsuit regarding Microsoft's ill-fated Vista Capable logo program. Earlier, I said Microsoft, OEMs, and retailers all deserved blame in the logo disaster, but these insider e-mails have changed my opinion on apportioning blame.

Those disappointed by the lack of a 3G announcement at Macworld can take heart. According to UBS analysts, iPhone chip supplier Infineon Technologies is ramping up production for the next generation iPhone. This time around, it will include a high-speed 3G data radio.

You have to admire a technology company that can build a business around airborne water particles. FogScreen has done that, with an impressive customer list that includes Disney, Nokia, 20th Century Fox, Sony, and Microsoft. Now it's taking its act to Vegas.

Linux has a lot of advantages as a desktop operating system. Power management, unfortunately, still is not one of them. But there are plenty of ways to make a Linux system less power-hungry -- and some of the most effective fixes are also some of the easiest.

In launching the NetSuite Business Operating System, the vendor is offering to host third-party software on its multi-tenant, on-demand architecture. As a result, ISVs and VARs can extend NetSuite's underlying capabilities to specific verticals.

My business is a real mixed shop, split nearly evenly between Windows users and Mac users. A real challenge for us, and probably for you too, is finding quality contractors and support organizations that have deep Mac knowledge (or, frankly, any Mac knowledge).

Whereï¿¼s the obvious place to research and buy a new Macintosh computer? You can find everything you need on Apple.com. But where are the best bargains? Despite Appleï¿¼s tight controls on retail pricing, the ï¿¼company storeï¿¼ rarely has the best deals.

Are you a jerk and do you want people to know it? In real life, it's easy to prove you are a jerk: You can talk loudly during movies, cut in line at Starbucks, or tell new mothers their babies are ugly. But on the Internet, it's harder to prove you're a jerk.

Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!